Secure The Way People Work On Microsoft 365 And Google . - Menlo Security

Transcription

Solution BriefSecure the waypeople work onMicrosoft 365 andGoogle Workspace.Make online work safe for your employees whereverbusiness takes them.

Solution BriefThe way we work is changing,making users more reliantthan ever on cloud-basedproductivity suites.Today, employees are working from home, in remote offices, and in customersites, and they connect to each other through cloud-based productivityplatforms that encourage collaboration with colleagues all over the worldthrough email, file sharing, messaging, and productivity apps. GoogleWorkspace (formerly G Suite) is a pioneer in this space, with millions of usersworldwide using Google Drive, Google Docs, Google Chat, and other businessapps every day. In addition, Microsoft 365 (formerly Office 365) is now used byone in five corporate employees globally, making it the most widely used cloudservice by user count.However, these platforms’ hundreds of millions of business users are alsohundreds of millions of potential targets for phishing and ransomware attacks.Malicious actors can easily spin up an authentic-looking email branded witha fake Google or Microsoft logo and send it to carefully vetted targets. Thesephishing emails often have malicious attachments that include code that infectsthe user’s device when downloaded. The platforms themselves can be usedas an attack vector as well, hosting malicious files that can be shared withunknowing targets.Traditional cybersecurity solutions creategaps in security posture for distributedusers.Traditional cybersecurity solutions rely on a detect-and-respond approach tosecure productivity suite access. These solutions use categorization, whitelistsand blacklists, and real-time threat intelligence to make an allow-or-blockdecision at the point of click. Unfortunately, there’s no way to identify legitimatefrom malicious requests originating from these trusted platforms, and networkarchitecture and latency issues prevent the inspection and routing of allMicrosoft 365 or Google Workspace traffic through a web proxy.Menlo Security2

Solution BriefComplicating the problem is the fact that today’s cloud applications are built forubiquitous connectivity, which puts an enormous stress on traditional securityinfrastructure made up of the usual firewalls and proxies (such as secure webgateways). The increased traffic requires enterprises to scale by adding additionalor bigger boxes—otherwise, performance for users greatly suffers.This forces enterprises to make a choice. They can either block all Microsoft 365or Google Workspace traffic, which would severely limit productivity and grindcloud transformation to a halt, or they can allow all traffic to flow unimpeded tousers’ devices. All too often, enterprises choose to allow Microsoft 365 or GoogleWorkspace traffic to bypass their traditional security layers, such as a proxy, andconnect directly to users. However, this approach eliminates a critical securitybarrier for attackers, allowing them to gain entry into the enterprise.A modern approach to security: Zero Trust.At the core of Zero Trust architectures is the idea that no traffic should be trusted.All browser-based Internet traffic should be treated as malicious, and web trafficshould be isolated from endpoint devices. This approach is comprehensive andremoves many issues associated with detection-based security. But until now, ZeroTrust has typically required significant management overhead. Organizations wouldhave to deploy and manage complex and expensive hardware or software clientsat every point where a user’s device connects to the Internet. This is simplyunscalable in today’s highly distributed world.BenefitsTake malware off thetable as a threat toyour employees.Menlo SecurityEnable directconnections betweenusers and the cloudproductivity suite.Create secure, lowlatency connectionsglobally to optimizeuser experience.3

Solution BriefThe Menlo Security innovation:An isolation-powered platform.Menlo Security has taken the Zero Trust approach and made it a scalable,easily implemented solution through the Menlo Security Cloud Platform. Ratherthan forcing an allow-or-block decision at the point of click, the Menlo SecurityPlatform powered by an Isolation Core provides a separate security layer inthe cloud where malicious traffic is blocked while all other traffic is isolated farfrom the end user’s device. It doesn’t matter if the web content is good or bad,categorized or uncategorized. This isolation-powered platform assumes thateverything is malicious and treats it accordingly. And because the platform is inthe cloud, it’s incredibly agile—scaling to be as large as an organization’s cloudand accommodating fluctuating workforces, business cycles, or traffic volume.Menlo Security Isolation-PoweredCloud PlatformSaaS SecurityCASBDLPMain OfficeEmail SecurityRewrite all linksIsolate all attachmentsRegional OfficeWeb SecurityRemove browsingprocess to the cloudRemote WorkerThe Menlo Security Platformallows users to freely click on anylink in webmail or a Google orMicrosoft 365 document, with noperformance hit or possibility ofinfection.The resulting traffic has no avenue for delivering malware to users’ devices,and the isolation layer is delivered as a service through the cloud—essentiallyprotecting users around the world no matter where or how they access theproductivity platforms.Menlo Security4

Solution BriefRealize the transformational promises of thecloud.Whether your organization relies on Google Workspace or Microsoft 365, usersneed reliable, safe, and secure access to business productivity tools whereverbusiness takes them. Unfortunately, traditional detection-based approaches tocybersecurity are ill equipped to stop attackers who use these nearly ubiquitousplatforms to breach systems. Instead, enterprises need to take a modernapproach to securing work. The Menlo Security Platform powered by anIsolation Core enables a Zero Trust approach to securing work by preventingmalware and other web-based attacks from using Microsoft 365 or GoogleWorkspace to access the endpoint—and we do this without impacting theapplication experience.Learn how Menlo Security is securing work. Visit menlosecurity.com or contactus at ask@menlosecurity.com.About Menlo SecurityMenlo Security enables organizations to eliminate threats and fully protect productivity with a one-of-akind, isolation-powered cloud security platform. It’s the only solution to deliver on the promise of cloudTo find out more, contact us:menlosecurity.com(650) 695-0695ask@menlosecurity.comsecurity—by providing the most secure Zero Trust approach to preventing malicious attacks; by makingsecurity invisible to end users while they work online; and by removing the operational burden for securityteams. Now organizations can offer a safe online experience, empowering users to work without worrywhile they keep the business moving forward. 2021 Menlo Security, All Rights Reserved.

kind, isolation-powered cloud security platform. It's the only solution to deliver on the promise of cloud security—by providing the most secure Zero Trust approach to preventing malicious attacks by making security invisible to end users while they work online and by removing the operational burden for security teams.